End-Point Security

 Open Windows Firewall Ports 

Open an elevated command prompt

Copy and paste the following into the command prompt window and hit enter

netsh advfirewall firewall add rule name=“IRYS UDP Port 12234” dir=in action=allow protocol=UDP localport=12234
netsh advfirewall firewall add rule name=“IRYS UDP Port 12234” dir=out action=allow protocol=UDP localport=12234

netsh advfirewall firewall add rule name=“IRYS Network Dongle UDP” dir=in action=allow protocol=UDP localport=1947
netsh advfirewall firewall add rule name=“IRYS Network Dongle UDP” dir=out action=allow protocol=UDP localport=1947

netsh advfirewall firewall add rule name=“IRYS Network Dongle TCP” dir=in action=allow protocol=TCP localport=1947
netsh advfirewall firewall add rule name=“IRYS Network Dongle TCP” dir=out action=allow protocol=TCP localport=1947

netsh advfirewall firewall add rule name=“IRYS TCP Port 12235” dir=in action=allow protocol=TCP localport=12235
netsh advfirewall firewall add rule name=“IRYS TCP Port 12235” dir=out action=allow protocol=TCP localport=12235

netsh advfirewall firewall add rule name=“CEFLA TCP Port 12236” dir=in action=allow protocol=TCP localport=12236
netsh advfirewall firewall add rule name=“CEFLA TCP Port 12236” dir=out action=allow protocol=TCP localport=12236

netsh advfirewall firewall add rule name=“CEFLA Console Port 5790” dir=in action=allow protocol=TCP localport=5790
netsh advfirewall firewall add rule name=“CEFLA Console Port 5790” dir=out action=allow protocol=TCP localport=5790


White-listing Applications, Folders, and Processes

Important: If including the following applications, processes, and folders does not allow iCapture to function properly then real-time protection will have to be permanently disabled. Although rare, this has been known to occur. It is important to remember that real-time filesystem protection is a native feature of Windows 10 and is not easy to manage. Windows will, at times, override or revert security settings during system reboot or during routine Windows update processes. Lastly, other security applications, such as Norton, McAfee, AVG, Kaspersky, etc all have their own real-time filesystem protection so be sure to always check what is applicable to your system. Cefla highly-recommends to include your IT provider for this phase of integration.

Be sure that the following are white-listed in all endpoint protection applications including Windows Defender. We highly recommend using PowerShell to perform these actions!
# Disable RealTime Monitoring

Set-MpPreference -DisableRealtimeMonitoring 1

# Disable Cloud-Delivred Protection

Set-MpPreference -MAPSReporting Disabled
Set-MpPreference -SubmitSamplesConsent Never

# Set Exclusions

Add-MpPreference -ExclusionPath “C:\NNT”
Add-MpPreference -ExclusionPath “C:\Program Files (x86)\Common Files\MyRay”
Add-MpPreference -ExclusionPath “C:\Program Files (x86)\Common Files\NewTom”
Add-MpPreference -ExclusionPath “C:\Program Files (x86)\iCapture”
Add-MpPreference -ExclusionPath “C:\iMAGERS”
Add-MpPreference -ExclusionPath “C:\Eaglesoft”
Add-MpPreference -ExclusionProcess “C:\Program Files (x86)\iCapture\iCaptureMonitor.exe”
Add-MpPreference -ExclusionProcess “C:\Program Files (x86)\iCapture\iCaptureNotificationArea.exe”
Add-MpPreference -ExclusionProcess “C:\Program Files (x86)\iCapture\iCaptureTwainToDisk.exe”
Add-MpPreference -ExclusionProcess “C:\Program Files (x86)\iCapture\iCaptureConnectionChecker.exe”
Add-MpPreference -ExclusionProcess “C:\NNT.exe”
Add-MpPreference -ExclusionProcess “C:\NNT_Bridge.exe”
Add-MpPreference -ExclusionProcess “C:\Eaglesoft\Shared\Eaglesoft.exe”